Him, an adventurer, CISO, soldier, Marine, law officer, author, professor, spy, yachty, motorcyclist, photographer. Her, was the church lady librarian, got divorced, joined a motorcycle gang, became a hacker, and world adventurer.

Main menu

Category: Innovation and Creation

by Samuel Liles • January 26, 2019 • Comments Off on Beware the professional path. There be dragons here

So, there I was talking to some people and I talked about focus of my career not being the same as longevity in my job. You see, long before the gig economy I started moving between jobs and looking for…

Apple CEO Tim Cook and previously Steve Jobs talk often about the idea of the iOS application eco-system. I think that is fundamentally flawed thinking. Thinking in terms of operating systems limits the level of innovation by constraining the product…

The following is an example of a proposal I wrote to bring enhanced information assurance and security education to the College of Technology. Though the proposal never went forward I thought it might be interesting for others to read. There…

In my class I told my students this simple test. With each successive significant change in power structure of geo-politics there were associated technologies. I like to think about exploitative technologies rather than destructive, but I digress. My test for…

Motorola quietly killed off the Atrix laptop, entertainment, phone concept that they were building. There are a few reasons they may have had difficulty, but I strongly suggest they were off the mark only a little. The content and communication…

The discussion of the concept of cyber warfare weapons jumps between a few threads that make them harder to understand than really is needed. One of the conceptual problems is that there are types or generations of cyber weapons and…

Abstract Can we accept that the security of information is not the same as the security of systems? If you were to draw a Venn diagram of the two they would intersect but neither would encompass the other. Or, would…

I was thinking about how to explain a process that might work in moving display data around and why you might want to do it. The following is my “poor” attempt at a graphic showing how things would move around.…

How do you wage cyber warfare? How do you make a world wide reach? What does it look like? What can we count on for results? All of these questions are part of the process of designing and implementing a…

RSS Links

Cyber?

Cyber security and the technologies of securing the information enterprise of industry and government require a trans-disciplinary while still STEM focused research agenda. The term “cyber” itself denotes a human cognitive centric concept that deals with the disintermediation of technology centered within human activity. The changing focus from system threat mitigation to enterprise risk management has opened completely new areas of inquiry into security.